Skip to main content

TMN security: An evolutionary approach

  • Conference paper
  • First Online:
  • 142 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 998))

Abstract

This paper focuses on the practical aspects of the integration of security services into telecommunication management applications as well as the building blocks needed to achieve a company wide security policy and ensure the consistent usage throughout the Telecommunication Management Network. The OSI security architecture [7] provides the flexibility necessary for the adaption to environments that deal with highly sensitive data like security management in a distributed telecommunication management network. However, to achieve interworking between implementations of different vendors it is of crucial importance to define functional security profiles and hence define an implementable subset of the security services suited to TMN. Prototype implementation and testing in the RACE project R2058 SAMSON has demonstrated that the security services and architectures currently under standardisation are capable to provide sufficient security mechanisms.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. CCITT, Melbourne. Recommendation X.500 — The Directory: Overview of Concepts, Models, and Services, 1988.

    Google Scholar 

  2. CCITT, Geneva. The Directory — Part 8: Authentication Framework, Recommendation X.509, 1992.

    Google Scholar 

  3. Commission of the European Communities, RACE Common Functional Specifications: H211: Security of Service Management, Aug 1994.

    Google Scholar 

  4. G. Endersz and It. Zamparo. Key management and the security of management in open systems: the SAMSON prototype. In Information Security — the Next Decade. Chapman & Hall, 1995.

    Google Scholar 

  5. European Computer Manufacturers Association, Geneva. ECMA-138, Security in Open Systems Data Elements and Service Definitions, 1989.

    Google Scholar 

  6. FIPS. Security Requirements for Cryptographic Modules, 1992.

    Google Scholar 

  7. International Standards Organization, Geneva. ISO 7498-2-1988(E), Information processing systems — Open System Interconnection — Basic Reference Model — Part 2: Security Architecture, 1988.

    Google Scholar 

  8. International Standards Organization. ISO/IEC 10736: Information Processing Systems, Open System Interconnection, Transport Layer Security Protocol, 1992.

    Google Scholar 

  9. CCITT, Geneva. Systems Management: Objects and Attributes for Access Control, Recommendation X.741, 1992.

    Google Scholar 

  10. CCITT, Geneva. Systems Management; Security Alarm Reporting Function, Recommendation X.736, 1992.

    Google Scholar 

  11. CCITT, Geneva. Definition of Management Information, Recommendation X.721, 1992.

    Google Scholar 

  12. CCITT, Geneva. Security Audit Trail Function, Recommendation X.740, 1992.

    Google Scholar 

  13. IEEE 802.10D. Key Management Protocol,.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Anne Clarke Mario Campolargo Nikos Karatzas

Rights and permissions

Reprints and permissions

Copyright information

© 1995 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Endersz, G., Gabrielsson, T., Morast, F., Bertsch, A., Bunz, H., Jurečič, M. (1995). TMN security: An evolutionary approach. In: Clarke, A., Campolargo, M., Karatzas, N. (eds) Bringing Telecommunication Services to the People — IS&N '95. IS&N 1995. Lecture Notes in Computer Science, vol 998. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0016955

Download citation

  • DOI: https://doi.org/10.1007/BFb0016955

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-60479-2

  • Online ISBN: 978-3-540-47618-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics